CVE-2024-27130
QTS, QuTS hero
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
4Exploited in Wild
-Decision
Descriptions
A buffer copy without checking size of input vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow users to execute code via a network. We have already fixed the vulnerability in the following version:
QTS 5.1.7.2770 build 20240520 and later
QuTS hero h5.1.7.2770 build 20240520 and later
Se ha informado que una vulnerabilidad de una copia del búfer sin verificar el tamaño de entrada afecta a varias versiones del sistema operativo QNAP. Si se explota, la vulnerabilidad podría permitir a los usuarios ejecutar código a través de una red. Ya hemos solucionado la vulnerabilidad en la siguiente versión: QTS 5.1.7.2770 build 20240520 y posteriores QuTS hero h5.1.7.2770 build 20240520 y posteriores
A buffer copy without checking size of input vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow users to execute code via a network. We have already fixed the vulnerability in the following version: QTS 5.1.7.2770 build 20240520 and later QuTS hero h5.1.7.2770 build 20240520 and later
CVSS Scores
SSVC
- Decision:Attend
Timeline
- 2024-02-20 CVE Reserved
- 2024-05-17 First Exploit
- 2024-05-21 CVE Published
- 2024-08-02 CVE Updated
- 2025-07-02 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
- CWE-121: Stack-based Buffer Overflow
CAPEC
- CAPEC-100: Overflow Buffers
References (5)
URL | Tag | Source |
---|---|---|
https://www.qnap.com/en/security-advisory/qsa-24-23 |
URL | Date | SRC |
---|---|---|
https://packetstorm.news/files/id/206034 | 2025-07-07 | |
https://github.com/watchtowrlabs/CVE-2024-27130 | 2024-05-17 | |
https://github.com/d0rb/CVE-2024-27130 | 2024-05-21 | |
https://github.com/XiaomingX/cve-2024-27130-poc | 2024-12-04 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Qnap Search vendor "Qnap" | Qts Search vendor "Qnap" for product "Qts" | * | - |
Affected
| ||||||
Qnap Search vendor "Qnap" | Quts Hero Search vendor "Qnap" for product "Quts Hero" | * | - |
Affected
| ||||||
Qnap Search vendor "Qnap" | Qts Search vendor "Qnap" for product "Qts" | * | - |
Affected
| ||||||
Qnap Search vendor "Qnap" | Quts Hero Search vendor "Qnap" for product "Quts Hero" | * | - |
Affected
|